Tag: spy
-
A Top Democrat Is Urging Colleagues to Support Trump’s Spy Machine
Tags: spyCongressman Jim Himes claims a sweeping surveillance authority should stay intact because he hasn’t seen abuses by Kash Patel’s FBI, according to internal messaging obtained by WIRED. First seen on wired.com Jump to article: www.wired.com/story/a-top-democrat-is-urging-colleagues-to-support-trumps-spy-machine/
-
New Android malware hiding in streaming apps to spy on users’ personal notes
A newly discovered Android malware is masking itself within television streaming apps in order to steal users’ passwords and banking data and spy on their personal notes, researchers have found. First seen on therecord.media Jump to article: therecord.media/malware-streaming-apps-android
-
Russia establishes Vienna as key western spy hub targeting NATO
Russia uses Vienna as its largest Western spy hub, monitoring NATO and other sensitive communications via diplomatic sites and satellite dishes. Western intelligence reports that Russia has transformed Vienna into its largest Western spy hub, steadily expanding surveillance over the past two years. Using diplomatic compounds and rooftop satellite clusters, Russia monitors sensitive communications across…
-
Researchers: Meta, TikTok Steal Personal & Financial Info When Users Click Ads
Tracking pixels let social media companies spy on their users even after they click over to advertiser sites, gleaning credit card info, geolocations, and more, according to an analysis. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/meta-tiktok-steal-sensitive-pii
-
Meta, TikTok Steal Personal & Financial Info When Users Click Ads
Tracking pixels let social media companies spy on their users even after they click over to advertiser sites, gleaning credit card info, geolocations, and more. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/meta-tiktok-steal-sensitive-pii
-
Meta, TikTok Steal Users’ Sensitive PII When They Click on Ads
Tracking pixels let social media companies spy on their own customers when they click over to advertiser sites, gleaning credit card info, currency type, and more. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/meta-tiktok-steal-sensitive-pii
-
Russia-linked APT uses DRILLAPP backdoor to spy on Ukrainian targets
Russia-linked threat actors target Ukrainian entities with DRILLAPP backdoor and use Edge debugging for stealth. A new DRILLAPP backdoor campaign targets Ukrainian organizations, abusing Microsoft Edge debugging to evade detection. Observed in February 2026, it shows links to previous Russian-aligned operations by Laundry Bear APT group (aka UAC-0190, Void Blizzard) using the PLUGGYAPE malware family…
-
New XWorm 7.1 and Remcos RAT Attacks Abuse Windows Tools to Evade Detection
New XWorm 7.1 and Remcos RAT campaigns abuse trusted Windows tools to evade detection. The attacks exploit a WinRAR flaw and use process hollowing to spy on victims. First seen on hackread.com Jump to article: hackread.com/xworm-7-1-remcos-rat-windows-tools-evade-detection/
-
China-Linked Hackers Hit Qatar with Backdoor Disguised as War News
China-linked hackers targeted Qatar using fake war news lures to spread PlugX backdoor malware and spy on military and energy sectors. First seen on hackread.com Jump to article: hackread.com/china-hackers-qatar-backdoor-fake-war-news/
-
APT28 conducts long-term espionage on Ukrainian forces using custom malware
APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) has used BEARDSHELL and COVENANT malware to conduct long-term surveillance of Ukrainian military personnel. According to ESET, the campaign began in April 2024 and relies on…
-
Russian military hackers revive advanced malware to spy on Ukraine, researchers say
Russian state hacker group APT28 has revived a sophisticated cyber-espionage toolkit to spy on Ukrainian targets, including military personnel, according to a report published Tuesday by cybersecurity firm ESET. First seen on therecord.media Jump to article: therecord.media/russia-apt-28-revives-malware-to-spy-on-ukraine
-
APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long”‘term surveillance of Ukrainian military personnel.The two malware families have been put to use since April 2024, ESET said in a new report shared with The Hacker News.APT28, also tracked as Blue Athena,…
-
This spy tool has been quietly stealing data for years
ESET researchers have traced the resurgence of Sednit through a modern toolkit built around two complementary implants, BeardShell and Covenant, each relying on a separate … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/sednit-espionage-toolkit-stealing-data/
-
Hackers Spread Fake Red Alert Rocket Alert App to Spy on Israeli Users
Researchers at Acronis have discovered a malicious trojanized version of the Red Alert rocket warning app targeting Israeli Android users. Distributed via fake Home Front Command SMS messages, this spyware steals GPS data, SMS messages, and contact lists while maintaining full alert functionality. First seen on hackread.com Jump to article: hackread.com/hackers-fake-red-alert-rocket-alert-app-spy-israel-users/
-
RedAlert Mobile Espionage Campaign Exploits Trojanized Rocket Alert App to Spy on Civilians
A newly discovered mobile espionage operation dubbed “RedAlert” has surfaced amid the ongoing IsraelIran conflict, exploiting wartime fear and dependency on early-warning systems. The campaign targets civilians by distributing a trojanized version of the Israeli Home Front Command’s official Rocket Alert application, aiming to harvest sensitive personal and geolocation data under the guise of legitimate security notifications. Researchers…
-
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devices’ electromagnetic and acoustic leaks”, a spying trick the NSA once codenamed TEMPEST. First seen on wired.com Jump to article: www.wired.com/story/how-vulnerable-are-computers-to-an-80-year-old-spy-technique-congress-wants-answers/
-
Coruna: Spy-grade iOS exploit kit powering financial crime
A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/03/coruna-ios-exploit-kit/
-
Chrome security flaw enabled spying via Gemini Live assistant
A Google Chrome vulnerability lets malicious extensions hijack Gemini Live to spy on users and steal sensitive files. Researchers at Palo Alto Networks found a Chrome vulnerability, tracked as CVE-2026-0628, that could let malicious extensions take control of the Gemini Live AI assistant. By abusing the flaw, attackers could spy on users and exfiltrate sensitive…
-
China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries
Tags: access, api, apt, china, cloud, communications, cyber, cyberespionage, data, defense, endpoint, espionage, google, government, group, hacker, infrastructure, intelligence, linux, mandiant, monitoring, network, phone, radius, service, spy, theft, threat, vpnHow Mandiant found it: The campaign came to light during a Mandiant Threat Defense investigation, when analysts flagged unusual activity on a CentOS server. A binary named xapt, designed to masquerade as the apt package manager on Debian-based Linux systems, had already escalated to root and was running shell commands to confirm its access level,…
-
Estonia spy chief calls on Europe to invest in its own offensive cyber capabilities
These capabilities are needed not just to mirror what the continent’s most capable adversaries can do, but also to match Europe’s defensive posture with credible tools to gain access to target networks, he said. First seen on therecord.media Jump to article: therecord.media/estonia-spy-chief-calls-on-europe-to-invest-in-own-offense
-
Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails
Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at LayerX First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fake-ai-assistants-google-chrome/
-
Doctors told to give Palantir’s NHS data platform the cold shoulder
200,000-strong union says spy-tech firm’s ICE work undermines patient trust First seen on theregister.com Jump to article: www.theregister.com/2026/02/11/bma_palantir_nhs/
-
Doctors told to give Palantir’s NHS data platform the cold shoulder
200,000-strong union says spy-tech firm’s ICE work undermines patient trust First seen on theregister.com Jump to article: www.theregister.com/2026/02/11/bma_palantir_nhs/
-
Doctors told to give Palantir’s NHS data platform the cold shoulder
200,000-strong union says spy-tech firm’s ICE work undermines patient trust First seen on theregister.com Jump to article: www.theregister.com/2026/02/11/bma_palantir_nhs/
-
Promptware Hackers Exploit Google Calendar Invites to Stealthily Stream Victim’s Camera via Zoom
A new era of AI vulnerability has arrived, and it is far more dangerous than simply tricking a chatbot into saying something rude. New research released this week demonstrates how attackers can weaponize everyday tools such as Google Calendar and Zoom to spy on users without ever prompting them to click a link. In a…
-
Hackers Use Signal QR Codes to Spy on Military and Political Leaders
Hackers are using Signal QR codes and fake support scams to spy on military and political leaders, German security agencies warn. First seen on hackread.com Jump to article: hackread.com/hackers-signal-qr-codes-spy-on-military-political-leaders/
-
The >>AllOne<< Spy: DKnife Malware Hijacks Routers to Swap Downloads
The post The >>All-in-One<< Spy: DKnife Malware Hijacks Routers to Swap Downloads appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/the-all-in-one-spy-dknife-malware-hijacks-routers-to-swap-downloads/
-
APT28 Weaponizes Office Flaw to Spy on NATO Military
The post APT28 Weaponizes Office Flaw to Spy on NATO Military appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/apt28-weaponizes-office-flaw-to-spy-on-nato-military/
-
DKnife toolkit abuses routers to spy and deliver malware since 2019
DKnife is a Linux toolkit used since 2019 to hijack router traffic and deliver malware in cyber-espionage attacks. Cisco Talos found DKnife, a powerful Linux toolkit that threat actors use to spy on and control network traffic through routers and edge devices. It inspects and alters data in transit and installs malware on PCs, phones,…

